| Index: content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| diff --git a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| index ae856ee7140136caf6454bd03fc4feae87c549e8..57e75e4c1fa9ab1974d0506564271f7ef1c5004d 100644
|
| --- a/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| +++ b/content/common/sandbox_linux/sandbox_seccomp_bpf_linux.cc
|
| @@ -114,7 +114,6 @@ ResultExpr AllowAllPolicy::EvaluateSyscall(int sysno) const {
|
| // If a BPF policy is engaged for |process_type|, run a few sanity checks.
|
| void RunSandboxSanityChecks(const std::string& process_type) {
|
| if (process_type == switches::kRendererProcess ||
|
| - process_type == switches::kWorkerProcess ||
|
| process_type == switches::kGpuProcess ||
|
| process_type == switches::kPpapiPluginProcess) {
|
| int syscall_ret;
|
| @@ -180,8 +179,7 @@ bool StartBPFSandbox(const CommandLine& command_line,
|
|
|
| if (process_type == switches::kGpuProcess) {
|
| policy.reset(GetGpuProcessSandbox().release());
|
| - } else if (process_type == switches::kRendererProcess ||
|
| - process_type == switches::kWorkerProcess) {
|
| + } else if (process_type == switches::kRendererProcess) {
|
| policy.reset(new RendererProcessPolicy);
|
| } else if (process_type == switches::kPpapiPluginProcess) {
|
| policy.reset(new PpapiProcessPolicy);
|
|
|